Online Social Network Security: A Comparative Review Using Machine Learning and Deep Learning

被引:0
|
作者
Chanchal Kumar
Taran Singh Bharati
Shiv Prakash
机构
[1] Jamia Millia Islamia,Department of Computer Science
[2] Ciena India Pvt. Ltd,Department of Electronics and Communication
[3] University of Allahabad,undefined
来源
Neural Processing Letters | 2021年 / 53卷
关键词
Online social networks; Attacks; Security; Malware analysis; Feature extraction; Big data; Machine learning; Deep learning;
D O I
暂无
中图分类号
学科分类号
摘要
In the present era, Online Social Networking has become an important phenomenon in human society. However, a large section of users are not aware of the security and privacy concerns involve in it. People have a tendency to publish sensitive and private information for example date of birth, mobile numbers, places checked-in, live locations, emotions, name of their spouse and other family members, etc. that may potentially prove disastrous. By monitoring their social network updates, the cyber attackers, first, collect the user’s public information which is further used to acquire their confidential information like banking details, etc. and to launch security attacks e.g. fake identity attack. Such attacks or information leaks may gravely affect their life. In this technology-laden era, it is imperative for users must be well aware of the potential risks involved in online social networks. This paper comprehensively surveys the evolution of the online social networks, their associated risks and solutions. The various security models and the state of the art algorithms have been discussed along with a comparative meta-analysis using machine learning, deep learning, and statistical testing to recommend a better solution.
引用
收藏
页码:843 / 861
页数:18
相关论文
共 50 条
  • [1] Online Social Network Security: A Comparative Review Using Machine Learning and Deep Learning
    Kumar, Chanchal
    Bharati, Taran Singh
    Prakash, Shiv
    [J]. NEURAL PROCESSING LETTERS, 2021, 53 (01) : 843 - 861
  • [2] A Comparative Review of Sentimental Analysis Using Machine Learning and Deep Learning Approaches
    Nagelli, Archana
    Saleena, B.
    [J]. JOURNAL OF INFORMATION & KNOWLEDGE MANAGEMENT, 2023, 22 (03)
  • [3] USING DEEP LEARNING AND MACHINE LEARNING IN SPACE NETWORK
    Shrivastava, Abhudaya
    Shrivastava, D. P.
    [J]. 2020 SEVENTH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY TRENDS (ITT 2020), 2020, : 83 - 88
  • [4] A Review on the Effectiveness of Machine Learning and Deep Learning Algorithms for Cyber Security
    R. Geetha
    T. Thilagam
    [J]. Archives of Computational Methods in Engineering, 2021, 28 : 2861 - 2879
  • [5] A Review on the Effectiveness of Machine Learning and Deep Learning Algorithms for Cyber Security
    Geetha, R.
    Thilagam, T.
    [J]. ARCHIVES OF COMPUTATIONAL METHODS IN ENGINEERING, 2021, 28 (04) : 2861 - 2879
  • [6] Social Network Users Profiling Using Machine Learning for Information Security Tasks
    Dubasova, Elizaveta
    Berdashkevich, Artem
    Kopanitsa, Georgy
    Kashlikov, Pavel
    Metsker, Oleg
    [J]. 2022 32ND CONFERENCE OF OPEN INNOVATIONS ASSOCIATION (FRUCT), 2022, : 87 - 92
  • [7] Evaluating online health information quality using machine learning and deep learning: A systematic literature review
    Baqraf, Yousef Khamis Ahmed
    Keikhosrokiani, Pantea
    Al-Rawashdeh, Manal
    [J]. DIGITAL HEALTH, 2023, 9
  • [8] REVIEW OF ONLINE FRAUD DETECTION BY MACHINE LEARNING USING ARTIFICIAL NEURAL NETWORK
    Hrishita, M.
    Tulasi, K. Sri Satya Sai
    Tejasri, K.
    [J]. ADVANCES AND APPLICATIONS IN MATHEMATICAL SCIENCES, 2021, 20 (11): : 2701 - 2705
  • [9] Strengthening Mobile Network Security Using Machine Learning
    Van Thuan Do
    Engelstad, Paal
    Feng, Boning
    Thanh Van Do
    [J]. MOBILE WEB AND INTELLIGENT INFORMATION SYSTEMS, (MOBIWIS 2016), 2016, 9847 : 173 - 183
  • [10] Improving Network Security Using Machine Learning Techniques
    Akbar, Shaik
    Chandulal, J. A.
    Rao, K. Nageswara
    Kumar, G. Sudheer
    [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2012, : 76 - 80